Web Security Reports

CW Nordics August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Nordic region, known for its startup companies, is a good platform for fintech companies to set up as consumers are conducive to digital banking services. In this issue, discover how major companies in the financial industry are partnering with startups and launching fintech initiatives and much more.
Posted: 08 Feb 2021 | Published: 24 Aug 2017

TechTarget ComputerWeekly.com

World Economic Forum Global Risks Report 2018
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: The World Economic Forum Global Risks Report 2018 identifies the top geopolitical risks facing the world in 2018. Environmental risks dominate, but cyber attacks, the risks of artificial intelligence, and the possibility of the internet defragmenting are high on the agenda.
Posted: 08 Feb 2021 | Published: 17 Jan 2018

TechTarget ComputerWeekly.com

Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017

TechTarget ComputerWeekly.com

How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 15 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

TechTarget ComputerWeekly.com

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by Thawte Inc.
EGUIDE: This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

Thawte Inc.

Save Your Future Self With Security Now
sponsored by TechTarget Software Quality
EBOOK: Secure testing is essential in keeping software vulnerabilities at bay. Learn the essentials of securing applications in this handbook.
Posted: 26 Apr 2016 | Published: 25 Apr 2016

TechTarget Software Quality

Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues
sponsored by Akamai Technologies
CASE STUDY: In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM